发布时间 :2006-06-02 06:18:00
修订时间 :2016-10-17 23:40:00

[原文]The HTTP Inspect preprocessor (http_inspect) in Snort 2.4.0 through 2.4.4 allows remote attackers to bypass "uricontent" rules via a carriage return (\r) after the URL and before the HTTP declaration.

[CNNVD]Snort HTTP检测预处理器 访问控制绕过漏洞(CNNVD-200606-060)

        Snort 中的HTTP检测预处理器(http_inspect)允许远程攻击者通过在URL之后和在HTTP声明之前的一个回车键(\r)来绕过"uricontent"规则。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CWE (弱点类目)

CWE-264 [权限、特权与访问控制]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  MLIST  [Snort-devel] 20060531 Snort Uricontent Bypass Vulnerability
(PATCH)  SECTRACK  1016191
(UNKNOWN)  BUGTRAQ  20060601 Snort HTTP Inspect Pre-Processor Uricontent Bypass
(UNKNOWN)  BUGTRAQ  20060602 New Snort Bypass - Patch - Bypass of Patch
(UNKNOWN)  BUGTRAQ  20060602 Re: New Snort Bypass - Patch - Bypass of Patch
(UNKNOWN)  BUGTRAQ  20060603 Re: New Snort Bypass - Patch - Bypass of Patch
(PATCH)  BID  18200
(UNKNOWN)  XF  snort-uricontent-rule-bypass(26855)

- 漏洞信息

Snort HTTP检测预处理器 访问控制绕过漏洞
中危 设计错误
2006-06-02 00:00:00 2006-08-24 00:00:00
        Snort 中的HTTP检测预处理器(http_inspect)允许远程攻击者通过在URL之后和在HTTP声明之前的一个回车键(\r)来绕过"uricontent"规则。

- 公告与补丁

        Snort Project snort-2.4.5.tar.gz
        Snort Project Snort 2.4.1
        Snort Project snort-2.4.5.tar.gz
        Snort Project Snort 2.4.2
        Snort Project snort-2.4.5.tar.gz
        Snort Project Snort 2.4.3
        Snort Project snort-2.4.5.tar.gz
        Snort Project Snort 2.4.4
        Demarc snort-2.4.4-demarc-patch.diff
        Demarc snort-2.4.4-demarc-patched.tar.gz
        Snort Project snort-2.4.5.tar.gz

- 漏洞信息

Snort HTTP Inspect Pre-Processor Uricontent Bypass
Remote / Network Access Input Manipulation
Loss of Integrity Third-Party Solution
Exploit Public Vendor Verified

- 漏洞描述

Snort contains a flaw that may allow a remote attacker to bypass IDS detection. The issue is triggered by adding a carriage return to the end of a URL, directly before the HTTP protocol declaration. It is possible that the flaw may allow bypass detection of "uricontent" rules resulting in a loss of integrity.

- 时间线

2006-05-31 2006-05-17
2006-05-31 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Demarc Threat Research Team has released an unofficial patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Snort URIContent Rules Detection Evasion Vulnerability
Design Error 18200
Yes No
2006-05-31 12:00:00 2007-06-20 03:59:00
Blake Hartstein of the Demarc Threat Research Team is credited with the discovery of this vulnerability.

- 受影响的程序版本

SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
Snort Project Snort 2.4.4
Snort Project Snort 2.4.3
Snort Project Snort 2.4.2
Snort Project Snort 2.4.1
Snort Project Snort 2.4 .0
S.u.S.E. UnitedLinux 1.0
S.u.S.E. SuSE Linux Standard Server 8.0
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SUSE LINUX Retail Solution 8.0
S.u.S.E. SuSE Linux Openexchange Server 4.0
S.u.S.E. SuSE Linux Open-Xchange 4.1
S.u.S.E. SUSE CORE 9 for x86
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Open-Enterprise-Server 1
S.u.S.E. Office Server
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Novell Linux Desktop 1.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Openexchange Server
S.u.S.E. Linux Office Server
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Desktop 1.0
S.u.S.E. Linux Database Server 0
S.u.S.E. Linux Connectivity Server
Snort Project Snort 2.4.5

- 不受影响的程序版本

Snort Project Snort 2.4.5

- 漏洞讨论

Snort is reportedly prone to a vulnerability that may allow malicious packets to bypass detection.

A successful attack can allow attackers to bypass intrusion detection and to carry out attacks against computers protected by Snort.

This vulnerability affects Snort 2.4.4. Other versions may be vulnerable as well.

- 漏洞利用

Attackers can use a browser to exploit this issue.

Proofs of concept are available:

perl -e'print "GET /|backdoor\r http/1.0\r\n\r\n"'|nc vulnerable.server 80

perl -e 'print "GET \x90\x90\x0d http/1.0\r\n\r\n"'|nc 80

perl -e 'print "GET \x0d/index.php\x90\x90 HTTP/1.0\n\r\n"'|nc 80

- 解决方案

The vendor has released version 2.4.5 to address this issue.

Third-party patches and updated Snort packages are available from Demarc Threat Research Team.

Further information from Sigint Consulting suggests that the patches available from Demarc may not completely fix this issue.

Please see the referenced third-party vendor advisories for more information.

Snort Project Snort 2.4 .0

Snort Project Snort 2.4.1

Snort Project Snort 2.4.2

Snort Project Snort 2.4.3

Snort Project Snort 2.4.4

- 相关参考